If a notice-level messaging is sent to a syslog server, which event has occurred?

If a notice-level messaging is sent to a syslog server, which event has occurred?A . A network device has restartedB . An ARP inspection has failedC . A routing instance has flappedD . A debug operation is runningView AnswerAnswer: C Explanation: Usually no action is required when a route flaps...

March 29, 2021 No Comments READ MORE +

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)A . when the sending device waits 15 seconds before sending the frame againB . when the cable length limits are exceededC . when one side of the connection is configured for half-duplexD . when...

March 29, 2021 No Comments READ MORE +

Which set of action satisfy the requirement for multifactor authentication?

Which set of action satisfy the requirement for multifactor authentication?A . The user swipes a key fob, then clicks through an email linkB . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile deviceC . The user enters a...

March 29, 2021 No Comments READ MORE +

What are two benefits of network automation? (Choose two)

What are two benefits of network automation? (Choose two)A . reduced operational costsB . reduced hardware footprintC . faster changes with more reliable resultsD . fewer network failuresE . increased network securityView AnswerAnswer: A C

March 29, 2021 No Comments READ MORE +

Which set of action satisfy the requirement for multifactor authentication?

Which set of action satisfy the requirement for multifactor authentication?A . The user swipes a key fob, then clicks through an email linkB . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile deviceC . The user enters a...

March 29, 2021 No Comments READ MORE +

Which configuration when applied to switch A accomplishes this task?

Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A accomplishes this task? A) B) C) D) A . Option...

February 5, 2021 No Comments READ MORE +

Which two actions influence the EIGRP route selection process? (Choose two)

Which two actions influence the EIGRP route selection process? (Choose two)A . The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.B . The router calculates the best backup path to the destination route and assigns it as the feasible successor.C . The router...

February 5, 2021 No Comments READ MORE +

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?A . TKIP encryptionB . SAE encryptionC . AES encryptionD . scrambled encryption keyView AnswerAnswer: B

February 5, 2021 No Comments READ MORE +

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?A . passiveB . mode onC . autoD . activeView AnswerAnswer: D

February 5, 2021 No Comments READ MORE +

Which usable IP address and subnet mask combination meets this criteria?

An engineer must configure a /30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?A . interface e0/0 description to HQ-A370:98968 ip address 10.2.1.3 255.255.255.252B . interface e0/0 description to HQ-A370:98968 ip address 192.168.1.1 255.255.255.248C . interface e0/0 description to HQ-A370:98968 ip address 172.16.1.4...

February 5, 2021 No Comments READ MORE +